those are very similar to the kind of tools you would need to hack into, let's say, the pentagon. >> reporter: and those fighting back say we can help. step one, avoid any message that looks suspicious. >> and that really comes from people who are not very careful about pass words, particularly pass words, e-mail pass words. >> reporter: so be careful because there are steps we can take to protect ourselves and our private data. in an ironic twist, the chinese hackers were found because in order to communicate with each other outside of the chinese firewall they had to logon to their facebook and twitter accounts where they were discovered. silicon valley technology at work to expose the hackers as well as to protect us from them. jessica? >> okay, thank you, scott. now one thing hackers could not disrupt is the steady march of google stock. shares reached a new peak today, $800 a share boosted by a rumor that google may soon open retail stores ala apple. california's largest public pension system is taking a stand on gun violence, withdrawing investments that make assault weapons an